Welcome to Amtivo in Ireland, formerly Certification Europe and EQA

cert eu logo eqa Logo white

Cyber Essentials

Secure your business with Cyber Essentials

Cyber Essentials is a globally recognised IT security standard developed by the UK’s National Cyber Security Centre, which is used to ensure that IT software and processes are secure and organisations are protected from data breaches and leaks. It may be a mandatory certification required by governments and large organisations when working with suppliers on sensitive projects.

Get Started Today

Enter your details below to get started on
your journey to certification.

Cyber Security Certifications

Cyber attacks pose a real threat to businesses. Unauthorised access to sensitive data through the supply chain and technical controls is becoming more common. With data based online on connected servers and cloud-based services, securing IT software and processes is crucial to prevent cybercrime and data breaches of sensitive information.

Gaining Cyber Essentials certification allows organisations to demonstrate their commitment to cyber security. It shows they have taken steps to safeguard data access via devices and software.

  • Enhance data security processes and policies to protect data
  • Demonstrate robust IT and data security systems to build customer trust and protect sensitive data.
  • Reduce the risk of reputational harm through data breaches and cyber attacks by ensuring secure supply chain.
  • Protect organisational assets, IP, sensitive and commercial data with advanced technical controls.
Amtivo (Formerly Certification Europe and EQA) - Cyber Essentials - Two workers observing a computer screen

What Are the Benefits of Cyber Essentials?

data security

Improve data security

Compliance with regulations

Ensure GDPR compliance

Misuse risk mitigation

Data breach mitigation

greater business opportunities

Greater business opportunities

Enhanced security

Demonstrate security commitment

Boosted customer confidence

Increased trust

Enhanced reputation

Enhanced reputation

customer satisfaction

Boosted customer confidence

Certifications

Cyber Essentials Logo

Cyber Essentials Certification

Cyber Essentials Certification enables organisations to assess themselves against five basic security controls, and a qualified assessor verifies the information provided.

Cyber Essentials Plus Logo

Cyber Essentials Plus Certification

Cyber Essentials Plus Certification is a technical audit of your system.
A qualified assessor examines the same five controls, testing that they work through a technical audit.

How Do I Become Cyber Essentials Certified?

Amtivo is proud to have access to a wealth of cyber security expertise, bringing an unrivalled experience to our client base in the field of cyber risk management. We work alongside our sister company, Ascentor, to bring our clients a seamless Cyber Essentials certification experience.

To begin your journey toward achieving Cyber Essentials, Cyber Essentials Plus or IASME Cyber Assured, please complete the enquiry form at the bottom of this page and one of our dedicated sales coordinators will contact you to discuss your requirements further.

Amtivo (Formerly Certification Europe and EQA) - Cyber Essentials - Office Cyber Security workers analysing data on their computers
Cyber Essentials Logo

Cyber Essentials Certification Process

This is the basic level of certification for Cyber Essentials. We operates this certification through our sister company, Certification Europe, who will support you through the certification process. Certification is achieved by a verified, self-assessed online questionnaire, covering information on your firewalls, malware protection, patch management, secure configuration of your devices and access control.

Process

  • Purchase Cyber Essentials Basic Certification by contacting the Ascentor Team using the form below.
  • The team will be in touch to provide you with your credentials to access your questionnaire.
  • You fill in the online questionnaire. Ascentor’s assessor will then review your answers and advise of any required changes before submission for certification.
  • You submit your online questionnaire for certification once you and the assessor are happy.
  • If successful, you will receive your certificate.
Cyber Essentials Plus Logo

Cyber Essentials Plus Certification Process

Do you already have Cyber Essentials and would like to secure Cyber Essentials Plus certification?

Cyber Essentials Plus requires a remote technical assessment of your system which includes a review of how you are meeting the 5 categories of Cyber Essentials.

Process

  • Contact the Ascentor Team using the form below.
  • The team will confirm that your current Cyber Essentials Basic Certificate has been issued within the last 3 months.
  • The team will assess the number of days testing and assessment will require and issue a quotation.
  • The team will arrange a convenient time for the remote assessment to take place.
  • If all criteria are met during the assessment, you will receive your Cyber Essentials Plus Certificate and report.

* If you need support in addressing any issues identified throughout the certification process, please contact us.

Frequently Asked Questions

What organisations implement Cyber Essentials?

Cyber Essentials is suitable for any organisation that requires a base-level security certification to demonstrate it has vital controls in place.

Cyber Essentials is also mandatory for businesses seeking UK government-specific contracts; without the certification, your organisation won’t be able to bid for such contracts.

What does Cyber Essentials cover?

Boundary Firewalls and Internet Gateways
Your first line of defence against an intrusion from the internet will be boundary firewalls and internet gateways. A well-configured firewall can prevent breaches before they penetrate deep into your network. At the same time, an internet gateway can deny users within your organisation to websites or other online services that present a threat.

Secure Configuration
Some setup and configuration will be required to ensure your hardware and software provide the most effective protection. Removing unused software and services from your devices will reduce the number of potential vulnerabilities as older versions of some widespread software have well-documented security vulnerabilities. It is also to ensure that you remove any default passwords used by software and hardware as these are well-known by hackers.

Access Control
Access to your system should be restricted to trusted users, so each of these users must have and use their username and password, which is appropriate to the job they are undertaking at the time. Administrator accounts should only be used when strictly necessary, such as installing known and trusted software.

A brute force password attack is a common method of attack, perhaps even by casual users trying to access your Wi-Fi. Therefore, you need to enforce strong passwords and frequent password changes and limit the number of failed login attempts. Passwords or other access should be cancelled immediately should a staff member leave the company or is absent for long periods.

Malware Protection
Malware is malicious software specifically designed to disrupt or damage a computer system. You should have anti-virus or anti-malware products regularly scanning your network to prevent or detect threats. You will also need to keep them up-to-date and switched on to continually monitor your computer system.

You should also make sure you receive and act upon any alerts issued by the malware protection.

Patch Management and Software Updates
Computer equipment and software need to be maintained regularly to fix any security vulnerabilities and keep it running smoothly. Security software such as anti-virus and anti-malware need regular updates to provide adequate protection. Checking regularly for updates and subsequently applying them will keep your software up-to-date, and most software can also be set to update automatically.

If your system is a few years old, you should review the protection you have to ensure it is still adequate. In between updates, you should use patches to maintain your computer system. A patch is a software designed to update a computer program or its supporting data to fix or improve it. This includes fixing security vulnerabilities and other bugs, with such patches usually called bug fixes, and improving usability or performance.

How long does a Cyber Essentials certificate last?

A Cyber Essentials certificate is 12 months certification and should be renewed annually due to the ever changing cyber world.

Would You Like a Quote for
ISO Certification Services?

Our team are here to help! Click the button below to complete our enquiry form for “Certification Services” and our team will be in touch with a quote and further information!

Get a Quote

Related Certifications

ISO 27001

Protect customer data, avoid security risks, demonstrate compliance and stay competitive with an ISO 27001 certification for your ISMS. Contact us for a free quote.

ISO 27017

Boost cloud data security and comply with strict data regulations with an ISO 27017 certification.

ISO 27018

An ISO 27018 certification helps secure Personally Identifiable Information (PII) data, protecting you from data breaches and lawsuits.

Sign Up to Our Newsletter

Enter your details below to ensure you stay up to date with all the latest certification news and expert insights.